{"id":"GHSA-hfmw-7g3m-gj6q","summary":"CoreDNS vulnerable to TuDoor Attacks","details":"An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.","aliases":["CVE-2023-28452","GO-2024-3130"],"modified":"2026-02-04T04:38:32.477550Z","published":"2024-09-18T15:30:52Z","related":["CGA-63fg-c9wm-q6cg"],"database_specific":{"severity":"HIGH","nvd_published_at":"2024-09-18T15:15:13Z","cwe_ids":["CWE-290"],"github_reviewed":true,"github_reviewed_at":"2024-09-18T17:38:50Z"},"references":[{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28452"},{"type":"WEB","url":"https://github.com/coredns/coredns/commit/604a902e2c7e0317aecaa3666124079c75a31573"},{"type":"WEB","url":"https://coredns.io"},{"type":"WEB","url":"https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-hfmw-7g3m-gj6q"},{"type":"PACKAGE","url":"https://github.com/coredns/coredns"}],"affected":[{"package":{"name":"github.com/coredns/coredns","ecosystem":"Go","purl":"pkg:golang/github.com/coredns/coredns"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.11.0"}]}],"database_specific":{"source":"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/09/GHSA-hfmw-7g3m-gj6q/GHSA-hfmw-7g3m-gj6q.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"}]}